Microsoft Windows Zero-Day Exploited In Pakistan Attacks

Microsoft has warned about a zero-day flaw in the Windows operating system that has actively been exploited in attacks on Pakistani targets.

Attackers have sent out emails requesting targets  open a special-crafted Word attachment that initiates an exploit using a malformed graphics image, or TIFF file, embedded in the document.

Microsoft said it had seen attacks in the Middle East and South Asia, saying hackers could use the flaw to gain the same rights as a logged-in user.

Pakistan zero-day attacks

But AlienVault Labs was more specific in its findings, saying it saw lure documents for the zero-day providing information on the Pakistan Intelligence service (Inter-Services Intelligence or ISI) and the Pakistani military.

“Based on the victim information we could retrieve from the C&C server we can confirm that most of IP addresses communicating with the C&C server are based on Pakistan,” wrote Jaime Blasco, head of AlienVault Labs.

Different kinds of payload were delivered on to target machines, communicating over HTTP with the same command and control servers.

The attack traffic seen by AlienVault was similar to that seen in Operation Hangover, which also saw a host of Pakistani government organisations targeted.

Microsoft has issued a “Fix it” solution for the zero-day, effectively preventing the rendering of TIFF images, which might not be ideal for graphics specialists fond of TIFFs.

But the company has also recommended customers use the Enhanced Mitigation Experience Toolkit (EMET). “This will help prevent exploitation by providing mitigations to protect against the issue and should not affect usability of any programs,” said Dustin Childs, Microsoft’s group manager for the Trustworthy Computing Group.

Customers using Microsoft Windows XP, Vista and Windows Server 2008 are affected, if they’re running Microsoft Office 2003 through 2010, and all supported versions of Microsoft Lync.

To learn more about Microsoft’s fix, head to its advisory here.

Are you a security expert? Try our quiz!

Thomas Brewster

Tom Brewster is TechWeek Europe's Security Correspondent. He has also been named BT Information Security Journalist of the Year in 2012 and 2013.

Recent Posts

Apple, Google Mobile Ecosystems Should Be Investigated, CMA Told

CMA receives 'provisional recommendation' from independent inquiry that Apple,Google mobile ecosystem needs investigation

10 mins ago

Australia Rejects Elon Musk Claim About Social Media Ban For Under-16s

Government minister flatly rejects Elon Musk's “unsurprising” allegation that Australian government seeks control of Internet…

3 hours ago

Northvolt Files For Bankruptcy Protection In US

Northvolt files for Chapter 11 bankruptcy protection in the United States, and CEO and co-founder…

5 hours ago

UK’s CMA Readies Cloud Sector “Behavioural” Remedies – Report

Targetting AWS, Microsoft? British competition regulator soon to announce “behavioural” remedies for cloud sector

20 hours ago

Former Policy Boss At X Nick Pickles, Joins Sam Altman Venture

Move to Elon Musk rival. Former senior executive at X joins Sam Altman's venture formerly…

22 hours ago

Bitcoin Rises Above $96,000 Amid Trump Optimism

Bitcoin price rises towards $100,000, amid investor optimism of friendlier US regulatory landscape under Donald…

24 hours ago